@@ -79,13 +79,13 @@ impl Auth {
7979 }
8080
8181 let Some ( auth_header) = auth_header else {
82- return Err ( AuthError :: HttpAuthHeaderMissing )
82+ return Err ( AuthError :: HttpAuthHeaderMissing ) ;
8383 } ;
8484
8585 match parse_http_auth_header ( auth_header) ? {
8686 HttpAuthHeader :: Basic ( actual_value) => {
8787 let Some ( expected_value) = self . http_basic . as_ref ( ) else {
88- return Err ( AuthError :: BasicNotAllowed )
88+ return Err ( AuthError :: BasicNotAllowed ) ;
8989 } ;
9090 // NOTE: this naive comparison may leak information about the `expected_value`
9191 // using a timing attack
@@ -133,7 +133,7 @@ impl Auth {
133133 }
134134
135135 let Some ( jwt) = jwt else {
136- return Err ( AuthError :: JwtMissing )
136+ return Err ( AuthError :: JwtMissing ) ;
137137 } ;
138138
139139 self . validate_jwt ( jwt, disable_namespaces)
@@ -145,7 +145,7 @@ impl Auth {
145145 disable_namespaces : bool ,
146146 ) -> Result < Authenticated , AuthError > {
147147 let Some ( jwt_key) = self . jwt_key . as_ref ( ) else {
148- return Err ( AuthError :: JwtNotAllowed )
148+ return Err ( AuthError :: JwtNotAllowed ) ;
149149 } ;
150150 validate_jwt ( jwt_key, jwt, disable_namespaces)
151151 }
@@ -250,11 +250,11 @@ fn parse_http_auth_header(
250250 header : & hyper:: header:: HeaderValue ,
251251) -> Result < HttpAuthHeader , AuthError > {
252252 let Ok ( header) = header. to_str ( ) else {
253- return Err ( AuthError :: HttpAuthHeaderInvalid )
253+ return Err ( AuthError :: HttpAuthHeaderInvalid ) ;
254254 } ;
255255
256256 let Some ( ( scheme, param) ) = header. split_once ( ' ' ) else {
257- return Err ( AuthError :: HttpAuthHeaderInvalid )
257+ return Err ( AuthError :: HttpAuthHeaderInvalid ) ;
258258 } ;
259259
260260 if scheme. eq_ignore_ascii_case ( "basic" ) {
0 commit comments